The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2015/Mar/15 - Issue Tracking, Mailing List, Third Party Advisory | |
References | () http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10052 - Permissions Required, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/72848 - Third Party Advisory, VDB Entry | |
References | () https://github.com/darkarnium/secpub/tree/master/Multivendor/ncc2 - Issue Tracking, Mitigation, Third Party Advisory |
08 Nov 2023, 20:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink dir-820l Firmware
Dlink dir-836l Firmware Dlink dir-808l Firmware Dlink dir-826l Firmware Dlink dir-830l Firmware Dlink dir-651 Firmware Dlink dir-626l Firmware Dlink dir-636l Firmware Dlink dir-810l Firmware |
|
CPE | cpe:2.3:o:d-link:dir-810l_firmware:1.01:b04:*:*:*:*:*:* cpe:2.3:o:d-link:dir-808l_firmware:1.03:b05:*:*:*:*:*:* cpe:2.3:o:d-link:dir-820l_firmware:1.02:b10:*:*:*:*:*:* cpe:2.3:o:d-link:dir-826l_firmware:1.00:b23:*:*:*:*:*:* cpe:2.3:o:d-link:dir-836l_firmware:1.01:b03:*:*:*:*:*:* cpe:2.3:o:d-link:dir-626l_firmware:1.04:b04:*:*:*:*:*:* cpe:2.3:o:d-link:dir-820l_firmware:1.05:b03:*:*:*:*:*:* cpe:2.3:o:d-link:dir-651_firmware:1.10na:b02:*:*:*:*:*:* cpe:2.3:o:d-link:dir-636l_firmware:1.04:*:*:*:*:*:*:* cpe:2.3:o:d-link:dir-810l_firmware:2.02:b01:*:*:*:*:*:* cpe:2.3:o:d-link:dir-820l_firmware:2.01:b02:*:*:*:*:*:* |
cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:* cpe:2.3:o:dlink:dir-830l_firmware:1.00:b07:*:*:*:*:*:* cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:* cpe:2.3:o:dlink:dir-820l_firmware:2.01:b02:*:*:*:*:*:* cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:* cpe:2.3:o:dlink:dir-651_firmware:1.10na:b02:*:*:*:*:*:* cpe:2.3:o:dlink:dir-826l_firmware:1.00:b23:*:*:*:*:*:* cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:* cpe:2.3:o:dlink:dir-836l_firmware:1.01:b03:*:*:*:*:*:* cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:* cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:* |
Information
Published : 2017-09-21 16:29
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1187
Mitre link : CVE-2015-1187
CVE.ORG link : CVE-2015-1187
JSON object : View
Products Affected
trendnet
- tew-651br
- tew-711br_firmware
- tew-652br
- tew-711br
- tew-810dr
- tew-651br_firmware
- tew-731br_firmware
- tew-810dr_firmware
- tew-652br_firmware
- tew-813dru
- tew-731br
- tew-813dru_firmware
dlink
- dir-651
- dir-826l_firmware
- dir-651_firmware
- dir-636l_firmware
- dir-810l_firmware
- dir-836l_firmware
- dir-808l
- dir-820l_firmware
- dir-808l_firmware
- dir-820l
- dir-826l
- dir-836l
- dir-830l_firmware
- dir-830l
- dir-626l_firmware
- dir-810l
- dir-626l
- dir-636l
CWE
CWE-287
Improper Authentication